Su Mon Kywe

According to our database1, Su Mon Kywe authored at least 9 papers between 2012 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Attacking Android smartphone systems without permissions.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Dissecting developer policy violating apps: characterization and detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2014
PrivateDroid: Private Browsing Mode for Android.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Batch Clone Detection in RFID-enabled supply chain.
Proceedings of the IEEE International Conference on RFID, 2014

Detecting Camouflaged Applications on Mobile Application Markets.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
A Survey of Recommender Systems in Twitter.
Proceedings of the Social Informatics, 2012

On Recommending Hashtags in Twitter Networks.
Proceedings of the Social Informatics, 2012


  Loading...